Filtered by vendor Microsoft Subscriptions
Total 22670 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-13315 3 Linux, Lynxtechnology, Microsoft 3 Linux, Twonky Server, Windows 2025-11-24 N/A
Twonky Server 8.5.2 on Linux and Windows is vulnerable to an access control flaw. An unauthenticated attacker can bypass web service API authentication controls to leak a log file and read the administrator's username and encrypted password.
CVE-2025-64695 2 Logstare, Microsoft 2 Collector, Windows 2025-11-24 N/A
Uncontrolled search path element issue exists in the installer of LogStare Collector (for Windows). If exploited, arbitrary code may be executed with the privilege of the user invoking the installer.
CVE-2025-62687 3 Linux, Logstare, Microsoft 3 Linux, Collector, Windows 2025-11-24 N/A
Cross-site request forgery vulnerability exists in LogStare Collector. If a user views a crafted page while logged, unintended operations may be performed.
CVE-2025-64299 3 Linux, Logstare, Microsoft 3 Linux, Collector, Windows 2025-11-24 N/A
LogStare Collector improperly handles the password hash data. An administrative user may obtain the other users' password hashes.
CVE-2025-58097 3 Linux, Logstare, Microsoft 3 Linux, Collector, Windows 2025-11-24 N/A
The installation directory of LogStare Collector is configured with incorrect access permissions. A non-administrative user may manipulate files within the installation directory and execute arbitrary code with the administrative privilege.
CVE-2025-61949 2 Linux, Microsoft 2 Linux, Windows 2025-11-24 N/A
LogStare Collector contains a stored cross-site scripting vulnerability in UserManagement. If crafted user information is stored, an arbitrary script may be executed on the web browser of the user who logs in to the product's management page.
CVE-2025-62189 3 Linux, Logstare, Microsoft 3 Linux, Collector, Windows 2025-11-24 N/A
LogStare Collector contains an incorrect authorization vulnerability in UserRegistration. If exploited, a non-administrative user may create a new user account by sending a crafted HTTP request.
CVE-2025-13524 4 Amazon, Apple, Linux and 1 more 4 Aws Wickr, Macos, Linux and 1 more 2025-11-24 5.7 Medium
Improper resource release in the call termination process in AWS Wickr before version 6.62.13 on Windows, macOS and Linux may allow a call participant to continue receiving audio input from another user after they close their call window. This issue occurs under certain conditions, which require the affected user to take a particular action within the application To mitigate this issue, users should upgrade AWS Wickr, Wickr Gov and Wickr Enterprise desktop version to version 6.62.13.
CVE-2025-59286 1 Microsoft 4 365, 365 Copilot, 365 Copilot Business Chat and 1 more 2025-11-22 9.3 Critical
Improper neutralization of special elements used in a command ('command injection') in Copilot allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59272 1 Microsoft 4 365, 365 Copilot, 365 Copilot Business Chat and 1 more 2025-11-22 9.3 Critical
Improper neutralization of special elements used in a command ('command injection') in Copilot allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59252 1 Microsoft 3 365, 365 Copilot, 365 Word Copilot 2025-11-22 9.3 Critical
Improper neutralization of special elements used in a command ('command injection') in Copilot allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-60711 1 Microsoft 1 Edge Chromium 2025-11-22 6.3 Medium
Protection mechanism failure in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
CVE-2025-59501 1 Microsoft 4 Configuration Manager, Configuration Manager 2403, Configuration Manager 2409 and 1 more 2025-11-22 4.8 Medium
Authentication bypass by spoofing in Microsoft Configuration Manager allows an authorized attacker to perform spoofing over an adjacent network.
CVE-2025-59500 1 Microsoft 2 Azure, Azure Notification Service 2025-11-22 7.7 High
Improper access control in Azure Notification Service allows an authorized attacker to elevate privileges over a network.
CVE-2025-59503 1 Microsoft 2 Azure, Azure Compute Resource Provider 2025-11-22 10 Critical
Server-side request forgery (ssrf) in Azure Compute Gallery allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-59273 1 Microsoft 3 Azure, Azure Event Grid, Azure Event Grid System 2025-11-22 7.3 High
Improper access control in Azure Event Grid allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-55321 1 Microsoft 1 Azure Monitor 2025-11-22 9.3 Critical
Improper neutralization of input during web page generation ('cross-site scripting') in Azure Monitor allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-59271 1 Microsoft 3 Azure Cache For Redis, Azure Cache For Redis Enterprise, Azure Managed Redis 2025-11-22 8.7 High
Redis Enterprise Elevation of Privilege Vulnerability
CVE-2025-59247 1 Microsoft 2 Azure, Azure Playfab 2025-11-22 8.8 High
Azure PlayFab Elevation of Privilege Vulnerability
CVE-2025-59246 1 Microsoft 2 Entra Id, Microsoft Entra Id 2025-11-22 9.8 Critical
Azure Entra ID Elevation of Privilege Vulnerability